| Already passed!!
1. The hash value in bits for MD5 is ____. 128
A. 128
B. 160
C. 256
2. Hashing involves taking a _____ length input and pro- variable; fixed
ducing a _____ length output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable
3. The hash value in bits for SHA-1 is ____. 160
A. 128
B. 160
C. 256
4. The hash value in bits for MD4 is ____. 128
A. 128
B. 160
C. 256
5. IPSec ______ mode involves "end-to-end" encryption; Transport
i.e. data remains encrypted from the time it leaves a
sender's device to the time it arrives at the receiver's
device.
A. Tunnel
B. Transport
C. Trusted
6. IPSec ______ mode involves encryption from gate- Tunnel
way to gateway, i.e. just through the public network
space.
, WGU C839V5/D334 EXAM 2025 EXAM QUESTIONS | 100% Verified Soluti
| Already passed!!
A. Tunnel
B. Transport
C. Trusted
7. A security analyst on a local network using monitoring Tunnel
tools is likely to only be able to read contents of traffic
encrypted using IPSec ______ mode. Remember, with tunnel
A. Tunnel mode, encryption does
B. Transport not happen until just be-
C. Trusted fore it leaves the local net-
work. Traffic likely remains
unencrypted between the
end user device and the
local network boundary.
8. _____ is a lightweight cryptography method for signing Chaskey
messages (MAC). It boasts a relatively undemanding
hardware implementation (only ~3,333 gates required
at 1MHz clock rate) making it suitable for IoT imple-
mentation.
9. Chaskey has a key size of _____ bits. 128
A. 256
B. 128
C. 80
10. A weakness of one-way hashing is that the same piece salt
of plaintext will result in the same ciphertext unless
_____ is applied.
A. Salt
B. Ash
C. Ether
, WGU C839V5/D334 EXAM 2025 EXAM QUESTIONS | 100% Verified Soluti
| Already passed!!
11. The minimum recommended key size to use with RC4 40
is _____ bits.
A. 40
B. 20
C. 64
12. RC4 is a symmetric stream cipher with a variable key 2048
size up to a max of _____ bits.
A. 256
B. 2048
C. 1024
13. _____ has a block size of 64 bits, key size of 56 bits, and Data Encryption Standard
16 rounds of substitution & transposition. (DES)
A. DES
B. AES
C. RC4
14. A(n) _____ is a collection of precomputed hash val- rainbow table
ues of actual plaintext passwords used for password
cracking.
A. initialization vector
B. key pair
C. rainbow table
15. _____ is a common x.509 certificate file type that is .cer
used with both PEM and DER formats.
A. .crt
B. .cer
C. .der
, WGU C839V5/D334 EXAM 2025 EXAM QUESTIONS | 100% Verified Soluti
| Already passed!!
16. _____ has a block size of 64 bits, key size of 112 bits, Triple Data Encryption
and 48 rounds of substitution & transposition. Standard (3DES)
A. DES
B. RSA
C. 3DES
17. Key sizes used with the Advanced Encryption Standard 128, 192, 256
(AES) include _____. _____, or _____.
A. 10, 12, 14
B. 128, 192, 256
C. 32, 64, 80
18. The Advanced Encryption Standard (AES) operates us- 128
ing _____ bit blocks.
A. 128
B. 192
C. 256
19. Skipjack is a symmetric block cipher that uses a ______ 80
bit key.
A. 64
B. 80
C. 112
20. Enocoro operates with a key size of ______ bits and an 128-bit key size; 64-bit IV
initialization vector (IV) of _____ bits.
A. 80; 80
B. 128; 64
C. 80; 64
21. Skipjack has a block size of _____bits. 64
A. 64